Troubleshooting: Control 1.17 - Endpoint Data Loss Prevention
Last Updated: February 2026
Common Issues
| Issue | Cause | Resolution |
|---|---|---|
| Device not appearing in Purview | Onboarding incomplete | Complete Defender onboarding |
| Policy not enforcing | Policy in test mode | Enable enforcement mode |
| USB not blocked | Device not in policy scope | Add device group to policy |
| No activity logged | Audit not enabled | Enable activity logging |
| False positives | SIT too broad | Tune confidence levels |
Detailed Troubleshooting
Issue: Device Not Appearing in Purview
Symptoms: Device is onboarded to Defender but not showing in Endpoint DLP
Diagnostic Steps:
-
Verify device in Defender portal:
security.microsoft.com > Assets > Devices Check health status -
Check device meets requirements:
- Windows 10 1809+ or Windows 11
- macOS Catalina 10.15+
-
Correct licensing
-
Verify DLP sensor is running on device
Resolution:
- Re-onboard device if status is unhealthy
- Verify E5 license is assigned
- Check for conflicting endpoint protection
- Wait 24-48 hours for initial sync
Issue: Policy Not Enforcing
Symptoms: Actions that should be blocked are allowed
Diagnostic Steps:
-
Check policy mode:
Purview > DLP > Policies > [Policy] Check if mode is "Enable" vs "Test" -
Verify policy locations include "Devices"
- Check if device is in policy scope
Resolution:
- Change policy mode from Test to Enable
- Verify device group is in policy scope
- Check for policy priority conflicts
- Review rule conditions
Issue: USB Transfer Not Blocked
Symptoms: Sensitive files copy to USB without restriction
Diagnostic Steps:
-
Verify USB restriction settings:
Purview > Endpoint DLP settings > Device properties -
Check if USB device is on allowed list
- Verify file contains sensitive data matching SITs
Resolution:
- Remove USB from allowed devices list
- Verify SIT definitions match test content
- Check USB restriction is set to Block (not Audit)
- Verify device receives policy updates
Issue: No Activity Being Logged
Symptoms: No events appear in Activity Explorer for endpoint actions
Diagnostic Steps:
- Verify audit logging is enabled
- Check device connectivity to cloud
- Review time range in Activity Explorer
Resolution:
- Enable "Always audit file activities for devices"
- Verify device has internet connectivity
- Wait 15-30 minutes for events to appear
- Check for service health issues
Issue: High False Positive Rate
Symptoms: Legitimate actions blocked incorrectly
Diagnostic Steps:
- Review blocked events in Activity Explorer
- Identify patterns in false positives
- Review SIT confidence levels
Resolution:
- Increase confidence threshold (65 → 75 → 85)
- Add exceptions for specific files/folders
- Create user override workflow
- Tune SIT patterns
How to Confirm Configuration is Active
Device Status
- Open Defender portal > Assets > Devices
- Verify device shows "Active" and healthy
- Check last activity time is recent
Policy Status
- Open Purview > DLP > Policies
- Verify policy shows "On" status
- Check policy locations include "Devices"
Test Enforcement
- Create test file with sensitive pattern (e.g., fake SSN)
- Attempt blocked action (USB copy, cloud upload)
- Verify block notification appears
- Check event in Activity Explorer
Escalation Path
If issues persist after troubleshooting:
- Purview Compliance Admin - Policy configuration
- Defender Admin - Device onboarding
- Intune Admin - Device deployment
- Microsoft Support - Platform issues
Known Limitations
| Limitation | Impact | Workaround |
|---|---|---|
| macOS limited features | Fewer restrictions available | Focus on Windows for Zone 3 |
| Browser restrictions browser-specific | Not all browsers supported | Use managed Edge browser |
| Offline enforcement delayed | May take time to sync | Use always-on VPN |
| No native mobile support | Mobile devices not covered | Use MAM policies instead |
| VM detection limited | Some VMs not fully supported | Test on target platforms |
Back to Control 1.17 | Portal Walkthrough | PowerShell Setup | Verification Testing